Comments on: WikiLeaks: When IT security threats are leakers, not hackershttp://searchcio.techtarget.com/blog/TotalCIO/WikiLeaks-When-IT-security-threats-are-leakers-not-hackers
A SearchCIO.com blogMon, 11 Sep 2017 15:44:30 +0000hourly1By: CleverHandlehttp://itknowledgeexchange.techtarget.com/total-cio/wikileaks-when-it-security-threats-are-leakers-not-hackers/#comment-573
Sat, 28 Aug 2010 16:44:04 +0000http://itknowledgeexchange.techtarget.com/total-cio/?p=1497#comment-573Lotus Notes already has security features in place to severely impede or outright prevent these kinds of threats. I guess the people who designed or deployed or planned these systems didn’t either know about Lotus Notes or know how to deploy it. Too bad the constant negative propaganda regarding Lotus Notes from MS discourages intelligent people from using it when they should.
Believe it or not, it is true. A camera picture of the screen is sometimes the only way to get secured information out of Lotus Notes, which of course assumes access to view it in the first place which can be controlled down to the field level.
If every SS# was maintained in a Lotus Notes database using shared keyed encrypted fields within encrypted documents within an encrypted database nobody would ever be able to, without the proper three encryption keys, be able to steel a SS# but would still have access to the other pieces of data in the same record that wasn’t sensitive.
Wish all IT folks and management knew that.
]]>